Filtered by CWE-20
Total 11839 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-33065 1 Qualcomm 80 Aqt1000, Aqt1000 Firmware, Fastconnect 6200 and 77 more 2024-10-16 8.4 High
Memory corruption while taking snapshot when an offset variable is set by camera driver.
CVE-2024-33066 1 Qualcomm 142 Csr8811, Csr8811 Firmware, Immersive Home 214 Platform and 139 more 2024-10-16 9.8 Critical
Memory corruption while redirecting log file to any file location with any file name.
CVE-2024-43697 1 Openatom 1 Openharmony 2024-10-16 3.3 Low
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through improper input.
CVE-2024-29155 2024-10-16 4.3 Medium
On Microchip RN4870 devices, when more than one consecutive PairReqNoInputNoOutput request is received, the device becomes incapable of completing the pairing process. A third party can inject a second PairReqNoInputNoOutput request just after a real one, causing the pair request to be blocked.
CVE-2024-48914 1 Vendure 1 Vendure 2024-10-16 9.1 Critical
Vendure is an open-source headless commerce platform. Prior to versions 3.0.5 and 2.3.3, a vulnerability in Vendure's asset server plugin allows an attacker to craft a request which is able to traverse the server file system and retrieve the contents of arbitrary files, including sensitive data such as configuration files, environment variables, and other critical data stored on the server. In the same code path is an additional vector for crashing the server via a malformed URI. Patches are available in versions 3.0.5 and 2.3.3. Some workarounds are also available. One may use object storage rather than the local file system, e.g. MinIO or S3, or define middleware which detects and blocks requests with urls containing `/../`.
CVE-2024-38189 1 Microsoft 5 365 Apps, Office, Office Long Term Servicing Channel and 2 more 2024-10-16 8.8 High
Microsoft Project Remote Code Execution Vulnerability
CVE-2024-38201 1 Microsoft 1 Azure Stack Hub 2024-10-16 7 High
Azure Stack Hub Elevation of Privilege Vulnerability
CVE-2024-38196 1 Microsoft 25 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 22 more 2024-10-16 7.8 High
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2024-9507 2024-10-15 4.9 Medium
The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 2.15.2 due to improper input validation within the iconUpload function. This makes it possible for authenticated attackers, with Administrator-level access and above, to leverage a PHP filter chain attack and read the contents of arbitrary files on the server, which can contain sensitive information.
CVE-2024-45117 1 Adobe 3 Commerce, Commerce B2b, Magento 2024-10-10 7.6 High
Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Input Validation vulnerability that could lead to arbitrary file system read. An admin attacker could exploit this vulnerability to read files from the system outside of the intended directories via PHP filter chain and also can have a low-availability impact on the service. Exploitation of this issue does not require user interaction and scope is changed.
CVE-2024-31227 2024-10-10 4.4 Medium
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem exists in Redis 7 prior to versions 7.2.6 and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-8518 2024-10-10 3.3 Low
CWE-20: Improper Input Validation vulnerability exists that could cause a crash of the Zelio Soft 2 application when a specially crafted project file is loaded by an application user.
CVE-2024-47823 1 Laravel 1 Livewire 2024-10-10 N/A
Livewire is a full-stack framework for Laravel that allows for dynamic UI components without leaving PHP. In livewire/livewire prior to `2.12.7` and `v3.5.2`, the file extension of an uploaded file is guessed based on the MIME type. As a result, the actual file extension from the file name is not validated. An attacker can therefore bypass the validation by uploading a file with a valid MIME type (e.g., `image/png`) and a “.php” file extension. If the following criteria are met, the attacker can carry out an RCE attack: 1. Filename is composed of the original file name using `$file->getClientOriginalName()`. 2. Files stored directly on your server in a public storage disk. 3. Webserver is configured to execute “.php” files. This issue has been addressed in release versions `2.12.7` and `3.5.2`. All users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-38194 1 Microsoft 1 Azure Web Apps 2024-10-09 8.4 High
An authenticated attacker can exploit an improper authorization vulnerability in Azure Web Apps to elevate privileges over a network.
CVE-2024-43455 1 Microsoft 10 Windows Server 2008, Windows Server 2008 R2, Windows Server 2008 Sp2 and 7 more 2024-10-09 8.8 High
Windows Remote Desktop Licensing Service Spoofing Vulnerability
CVE-2024-38245 1 Microsoft 25 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 22 more 2024-10-09 7.8 High
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38244 1 Microsoft 20 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 17 more 2024-10-09 7.8 High
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38243 1 Microsoft 20 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 17 more 2024-10-09 7.8 High
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38234 1 Microsoft 25 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 22 more 2024-10-09 6.5 Medium
Windows Networking Denial of Service Vulnerability
CVE-2024-38046 1 Microsoft 20 Windows 10 1507, Windows 10 1607, Windows 10 1809 and 17 more 2024-10-09 7.8 High
PowerShell Elevation of Privilege Vulnerability